Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Semidefinite programming relaxations for quantum correlations
Semidefinite programs are convex optimization problems involving a linear objective
function and a domain of positive-semidefinite matrices. Over the past two decades, they …
function and a domain of positive-semidefinite matrices. Over the past two decades, they …
Universal limitations on quantum key distribution over a network
We consider the distribution of secret keys, both in a bipartite and a multipartite (conference)
setting, via a quantum network and establish a framework to obtain bounds on the …
setting, via a quantum network and establish a framework to obtain bounds on the …
Modified BB84 quantum key distribution protocol robust to source imperfections
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key
distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts …
distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts …
Security of quantum key distribution from generalised entropy accumulation
The goal of quantum key distribution (QKD) is to establish a secure key between two parties
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …
Numerical calculations of the finite key rate for general quantum key distribution protocols
Finite key analysis of quantum key distribution (QKD) is an important tool for any QKD
implementation. While much work has been done on the framework of finite key analysis, the …
implementation. While much work has been done on the framework of finite key analysis, the …
Unbalanced-basis-misalignment-tolerant measurement-device-independent quantum key distribution
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary
protocol since it is physically immune to all attacks on the detection side. However, the …
protocol since it is physically immune to all attacks on the detection side. However, the …
Security analysis against the Trojan horse attack on practical polarization-encoding quantum key distribution systems
T Luo, Q Liu, X Sun, C Huang, Y Chen, Z Zhang, K Wei - Physical Review A, 2024 - APS
Quantum key distribution (QKD), which theoretically provides unconditional secure
communication, has developed rapidly in the past decades. However, the practical QKD …
communication, has developed rapidly in the past decades. However, the practical QKD …
Coherent-state-based twin-field quantum key distribution
Large-scale quantum communication networks are still a huge challenge due to the rate-
distance limit of quantum key distribution (QKD). Recently, twin-field (TF) QKD has been …
distance limit of quantum key distribution (QKD). Recently, twin-field (TF) QKD has been …
Securing practical quantum communication systems with optical power limiters
Controlling the energy of unauthorized light signals in a quantum cryptosystem is an
essential criterion for implementation security. Here, we propose a passive optical power …
essential criterion for implementation security. Here, we propose a passive optical power …
Optimized protocol for twin-field quantum key distribution
Twin-field quantum key distribution (TF-QKD) and its variant protocols are highly attractive
due to the advantage of overcoming the rate-loss limit for secret key rates of point-to-point …
due to the advantage of overcoming the rate-loss limit for secret key rates of point-to-point …